Splunk Search

How to count values across multiple similarly named fields

o_cardoso
Engager

Hi!

Given 2 events:

SummaryDialog Component1=wxt_12 Component2=wyt_1 Component3=wzt_3 Component4=wbt_2

SummaryDialog Component1=wyt_2 Component2=wxt_12 Component3=wbt_2 Component4=wzt_1

 

I'm trying to get a summary of the occurrences of each unique value regardless of the component:

wbt_2 2

wxt_12 2

wyt_1 1

wyt_2 1

wzt_3 1

wzt_6 1

Naively, I hoped this would work:

index=cls_preprod SummaryDialog | stats count by component*

 

It does not (returns no results).  Does anyone have any suggestions?  I've been googling for awhile and have not hit upon a viable solution. Note there a N number of components

Thanks!

(and forgive me if this is a basic question.. i am very basic splunk user)

 

Labels (1)
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "Component[^=]+=(?<component>\S+)"
| stats count by component

View solution in original post

o_cardoso
Engager

works great, thanks!!

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| rex max_match=0 "Component[^=]+=(?<component>\S+)"
| stats count by component
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...